First published: Wed May 07 2025(Updated: )
A vulnerability in the application data endpoints of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to write arbitrary files to an affected system. This vulnerability is due to improper validation of requests to APIs. An attacker could exploit this vulnerability by sending malicious requests to an API within the affected system. A successful exploit could allow the attacker to conduct directory traversal attacks and write files to an arbitrary location on the affected system.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Catalyst SD-WAN Manager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20187 has been classified as a high severity vulnerability due to its potential for remote exploitation.
To fix CVE-2025-20187, ensure that you apply the latest security patches provided by Cisco for the Catalyst SD-WAN Manager.
CVE-2025-20187 affects Cisco Catalyst SD-WAN Manager, specifically versions that utilize the vulnerable APIs.
The potential impact of CVE-2025-20187 includes unauthorized remote file writing, which could compromise system integrity.
Yes, CVE-2025-20187 is remotely exploitable, allowing authenticated attackers to exploit the vulnerability without physical access.